Uncommon Connection to Active Directory Web Services
Last updated on:
In this page
About the rule
Rule Type
Standard
Rule Description
Detects uncommon network connections to the Active Directory Web Services (ADWS) from processes not typically associated with ADWS management.
Severity
Trouble
Rule Requirement
Criteria
Action1: actionname = "sa_network_connection" AND (((IS_INITIATED = "true" AND DEST_PORT = "9389") AND ((PROCESSNAME != "c:\program files\microsoft monitoring agent" AND (((PROCESSNAME notstartswith "c:\program files\powershell\7\pwsh.exe" AND PROCESSNAME notstartswith "c:\program files\powershell\7-preview\pwsh.ex") AND PROCESSNAME notstartswith "c:\windows\system32\windowspowershell") AND PROCESSNAME notstartswith "c:\windows\syswow64\windowspowershell")) AND PROCESSNAME != "c:\windows\system32\dsac.exe"))) select Action1.HOSTNAME,Action1.MESSAGE,Action1.USERNAME,Action1.PROCESSNAME,Action1.DESTINATIONHOST,Action1.DESTINATION_IPV6,Action1.DEST_IP,Action1.SOURCEHOST,Action1.SOURCE_IP,Action1.SOURCE_IPV6
Detection
Execution Mode
realtime
Log Sources
Active Directory
Author
@kostastsale


